Cisco Blogs


Cisco Blog > Mobility

Beyond Today’s Productivity and Efficiency: Enterprise Mobility Enables Long-Term Growth

One of the basic tenants of enterprise mobility is its direct influence on “now”.

When organizations implement mobile policies like BYOD and virtualized desktops, day-to-day operations can immediately improve. In most cases, the rate of return on seeing change is direct. However, the impact of enterprise mobility is not short-lived.sixsteps

Recently, we counted down the “Six Essential Steps for Unleashing the Power of Enterprise Mobility.”  Throughout the series, we provided a guide for enterprises to follow to implement broader mobility. We discussed how businesses could benefit now by untethering their global workforce and increasing productivity. The series highlighted a tactical approach to mobility, yet we would be amiss not to discuss the long-term transformational impact mobility can have on businesses. How can mobility be a catalyst for organizational growth and innovation?

Last week, I read an IT Web article by Johannesburg-based Lebo Mashiloane that discussed how BYOD and mobility are fueling enterprise growth. The article brought up a concept that is always important to keep top-of-mind: How today’s technology solutions are changing the landscape of tomorrow. Read More »

Tags: , , , , , , , , , , ,

The Sixth Step to Enterprise Mobility: Power to Your People

This is the sixth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here. The fifth blog post focused on defending data can be found here.

step6a

Watch video at http://youtu.be/3kD5EpXypFc

Over the course of this series, we’ve discussed how enterprises can better enable people to work in their own way, regardless of where they are and what device they are using. We started by making smart plans at an architecture level and then implementing secure policies along the way. The final step enterprises need to take may be the hardest one of all but can yield the greatest results. To increase productivity, business agility, and customer satisfaction, enterprises must actively embrace mobility in the workplace. Here’s a short checklist to help organizations with this last step:

1. Go Beyond Provisioning Mobility for Sales: Think “All-Company” Mobility.

The definition of mobility is expanding to include not just “road warriors” but also “corridor warriors,” as well as guest and home workers.

Make sure your mobility architecture is designed to accommodate them all. Then create a phased implementation plan. Determine which users and business processes you want to prioritize first and move forward at a pace that makes sense for your enterprise.

An all-hands-on-deck approach will also help drive future implementation of mobile solutions. Read More »

Tags: , , , , , , , , , , ,

BYOD with Flair - Cisco Customer Vitra AG has Designs on Manufacturing.

September 13, 2013 at 9:20 am PST

 

Having just moved into a new house, my wife and I are looking to see how all our old furniture can be re-used - with her eye on the best design (she's a designer by trade), and my eye on cost. We'll end up somewhere in the middle I expect, slightly geared towards 'design' if past experience is anything to go by!

An example of Vitra design - the VitraHaus

Swiss furniture manufacturer Vitra pulls off both objectives - providing customers with great design, AND managing to reduce cost in the organization, How? With Cisco of course!

Take a visit across the Swiss border into Germany and you can visit to the VitraHaus location, its flagship store. Visiting Vitrahaus is like taking a trip through design history, but it also offers the opportunity to encounter the work of leading contemporary designers. Furnishings and objects from the Vitra Home Collection are arranged in a variety of settings for both living and working.

Communications and collaboration are central to bringing these concepts to life. Vitra has been partnering with Cisco for over a decade, evolving its IT infrastructure and expanding wireless LAN deployments. The biggest concentration of wireless access points, more than 70, is at Weil am Rhein. The latest stage of that IT strategy intends to make wireless a key enabler for business transformation.

“Improving guest Wi-Fi access was very important,” says Marco Gersbacher, head of IT infrastructure services at Vitra, “while we also wanted to make sure the business was fully prepared for bring-your-own-device.

Although Vitra had no formal bring-your-own-device (BYOD) policy, a growing number of employees were using personal smartphones and tablets alongside company laptops in the workplace.

Vitra Style - style is pervasive in all that they do.

Vitra Style - style is pervasive in all that they do.

This trend created problems with device recognition and password reset requests. Certain devices could connect only over the wired network, others just to Wi-Fi, and some not at all. So, a robust BYOD framework was a strategic priority. Without visibility of devices, however, the company was unable to guarantee network performance and security.

A validated Cisco® Borderless Network design has helped enable Vitra unify access across all network domains: wired, wireless, and VPN. The solution was installed by NextiraOne and includes the following components: Read More »

Tags: , , , , , ,

The Fifth Step to Enterprise Mobility: Defending Your Data

This is the fifth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here

In a 2012 survey of IT executives and CEOs, nearly half of the companies that permit mobility and BYOD reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. In addition, security concerns continue to remain a key issue for decision makers looking to deploy additional mobile solutions such as enterprise mobile apps, according to a recent article from IT Pro.

Careful planning can help enterprises manage security concerns and harness the power of mobility. Here’s a brief checklist to help organizations secure devices, data and the network:

Watch the video: http://youtu.be/k8ytncvjE7M

Watch the video: http://youtu.be/k8ytncvjE7M

1. IT Pushing of Capability Down to End Devices

 IT needs to be able to push capabilities down to end devices and access control for both on-premises and off-premises apps, while providing pull capabilities for users, so they can self-provision apps.

IT must have the ability to apply situational control policies (for example, for disabling cameras on mobile devices in order to protect on-premises company assets when employees and guests are on corporate premises or in restricted areas). Another must have? The ability to remotely locate, lock, and wipe devices should there be a theft or if an employee leaves the company. It is also essential to be able to automate geo-specific policies to control roaming costs when workers are out of country. Read More »

Tags: , , , , , , , , , , ,

The Fourth Step to Enterprise Mobility: Create an App Checkpoint

This is the fourth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here.  

For today’s app-centric mobile workforce, it’s no longer enough to provide basic security features for devices. Gone are the days where security for mobility is “all or nothing” where virtual private networks (VPNs) gave you access to all corporate network resources, or you had very limited email and calendaring access.

Today, enterprises are managing public and private mobile applications that require a shift in security practices and a new application strategy. Here’s a short checklist to guide enterprises as they create app checkpoints to meet new security demands:

Step 4

To watch the video, see: http://youtu.be/dpQ5_n6FoX4

1. Look for a rapid, reliable, and secure vetting process for applications. 

IT security teams are usually directed toward securing the network and the devices connected to it, versus securing the applications that run on those devices. Many organizations lack the resources to evaluate an application’s ability to handle sensitive information throughout its lifecycle.

Companies rarely have the resources to monitor sites that could breed malware, nor do they have the ability to maintain heuristic algorithms to identify such sites prior to infection. And those that decide to secure mobile apps themselves might end up having to prioritize remediations, leaving them vulnerable. Read More »

Tags: , , , , , , , , , , ,